SlideShare a Scribd company logo
2
Most read
9
Most read
11
Most read
Confidentiality using
symmetric encryption
Symmetric Key Cryptography
Confidentiality using Symmetric Encryption
• Traditionally symmetric encryption is used to provide
message confidentiality.
• Consider a typical scenario
•Workstations on LANs access other workstations &
servers on LAN
•LANs are interconnected using switches/routers
•With external lines or radio/satellite links
Points of Vulnerability
Confidentiality using Symmetric Encryption
•Consider attacks and placement in this scenario
•Snooping from another workstation
•Use dial-in to LAN or a server to snoop
•Use external router link to enter & snoop
•Monitor and/or modify traffic on external links
Confidentiality using Symmetric Encryption
•Have two major placement alternatives
•Link Encryption
•End-to-End Encryption
Location of Encryption Device Link
Encryption
• Encryption devices are placed at each end of the link
• Encryption occurs independently on every link
• All the communication is made secure
• A lot of encryption devices are required
Link Encryption Implications
•All paths must use link encryption
•Each pair of node must share a unique key
•Large number of keys should be provided
End-to-End Encryption
• Source encrypts and the Receiver decrypts
• Payload encrypted
• Header in the clear
• Only destination and reciever share the key
• High Security: Booth link and end-to-end encryptions are
needed.
Encryption Across a Packet Switching
Network
Traffic Analysis
• When using end-to-end encryption must leave headers in
clear
• So network can correctly route information
• Although content is protected, traffic flow patterns are not
• Ideally want both at once
• End-to-End protects data contents over entire path and
provides authentication
• Link protects traffic flows from monitoring
Placement of Encryption
• Can place encryption function at various layers in OSI
Reference Model
• Link encryption occurs at layers 1 or 2
• End-to-End can occur at layers 3, 4, 6, 7
• As move higher, less information is encrypted but it is
more secure and more complex with entitled and keys
Encryption coverage implications of store
and forward communications
Traffic Analysis
• Monitoring of communications flows between parties
• Useful both in military & commercial spheres
• Link encryption obscures header details
• But overall traffic volumes in networks and at
endpoints is still visible
• Traffic padding can further obscure flows
• But at cost of continuous traffic
• Presented by: Ayush Jain
• Enrolment number: IU1941090004
Thank You.

More Related Content

PDF
Chapter 1 Introduction of Cryptography and Network security
Dr. Kapil Gupta
 
PPTX
Cryptography and Network Security
Pa Van Tanku
 
PPTX
Cryptography
Sidharth Mohapatra
 
PPTX
Pgp pretty good privacy
Pawan Arya
 
PPTX
Secure Socket Layer
Pina Parmar
 
PPTX
Check sum
Pooja Jaiswal
 
PPTX
Encryption And Decryption Using AES Algorithm
Ahmed Raza Shaikh
 
PPT
Introduction to switching & circuit switching
Dr Rajiv Srivastava
 
Chapter 1 Introduction of Cryptography and Network security
Dr. Kapil Gupta
 
Cryptography and Network Security
Pa Van Tanku
 
Cryptography
Sidharth Mohapatra
 
Pgp pretty good privacy
Pawan Arya
 
Secure Socket Layer
Pina Parmar
 
Check sum
Pooja Jaiswal
 
Encryption And Decryption Using AES Algorithm
Ahmed Raza Shaikh
 
Introduction to switching & circuit switching
Dr Rajiv Srivastava
 

What's hot (20)

PDF
Hash Function.pdf
Santosh Gupta
 
PDF
Classical encryption techniques
Dr.Florence Dayana
 
PPT
6. cryptography
7wounders
 
PPT
Network security cryptographic hash function
Mijanur Rahman Milon
 
PPTX
Network security
hajra azam
 
PPTX
Symmetric and asymmetric key
Triad Square InfoSec
 
PDF
symmetric key encryption algorithms
Rashmi Burugupalli
 
PDF
AES-Advanced Encryption Standard
Prince Rachit
 
PPTX
Mathematics of Asymmetric cryptography
Sou Jana
 
PPTX
Confusion and Diffusion.pptx
bcanawakadalcollege
 
PPTX
MAC-Message Authentication Codes
DarshanPatil82
 
PPT
Message authentication and hash function
omarShiekh1
 
PPTX
Data Encryption Standard (DES)
Haris Ahmed
 
PDF
5. protocol layering
JAIGANESH SEKAR
 
PPTX
Cryptography
jayashri kolekar
 
PPTX
Cryptography.ppt
kusum sharma
 
PPTX
Hash Function
Siddharth Srivastava
 
PPTX
Computer networks - Channelization
Elambaruthi Elambaruthi
 
PPTX
Csma cd and csma-ca
kazim Hussain
 
PDF
Types of Cryptosystem and Cryptographic Attack
Mona Rajput
 
Hash Function.pdf
Santosh Gupta
 
Classical encryption techniques
Dr.Florence Dayana
 
6. cryptography
7wounders
 
Network security cryptographic hash function
Mijanur Rahman Milon
 
Network security
hajra azam
 
Symmetric and asymmetric key
Triad Square InfoSec
 
symmetric key encryption algorithms
Rashmi Burugupalli
 
AES-Advanced Encryption Standard
Prince Rachit
 
Mathematics of Asymmetric cryptography
Sou Jana
 
Confusion and Diffusion.pptx
bcanawakadalcollege
 
MAC-Message Authentication Codes
DarshanPatil82
 
Message authentication and hash function
omarShiekh1
 
Data Encryption Standard (DES)
Haris Ahmed
 
5. protocol layering
JAIGANESH SEKAR
 
Cryptography
jayashri kolekar
 
Cryptography.ppt
kusum sharma
 
Hash Function
Siddharth Srivastava
 
Computer networks - Channelization
Elambaruthi Elambaruthi
 
Csma cd and csma-ca
kazim Hussain
 
Types of Cryptosystem and Cryptographic Attack
Mona Rajput
 
Ad

Similar to Confidentiality using symmetric encryption.pptx (20)

DOCX
Packet switching
Vikash Dhal
 
PPT
key distribution in network security
babak danyal
 
PPT
Cyber security Unit 3 Cryptography and Network security
eticket4403
 
PPT
ch07.ppt
ssuser4198c4
 
PPTX
Cryptography Overview Presentation circa 2005
Dan Houser
 
PDF
Bt0088 cryptography and network security2
Techglyphs
 
PDF
Understanding senetas layer 2 encryption
Senetas
 
PPT
CS553 ST7 Ch21 Network Security chapter 21
KhaledMohammadSoradi
 
PPT
CS553_ST7_Ch21-NetworkSecurityhhhhggg.ppt
BinyamBekeleMoges
 
PPT
network security
Srinivasa Rao
 
PDF
Web Presen
guest79a91d
 
DOCX
network security
BishalWosti1
 
PPT
Network Security Chapter 7
AfiqEfendy Zaen
 
PPTX
lecture 7.pptx
MelkamuEndale1
 
PPT
Net Security Basic
phanleson
 
DOCX
Chapter 8Secure Transport LayerIn the early days of th
JinElias52
 
PPTX
Fundamental Concept of Cryptography in Computer Security
Uttara University
 
PPT
Hardware Network Trojans for neural Networks
gayathrid55
 
PDF
Week13presentation
yuki0722_0007
 
PPTX
Encryption in information security ppt slideshare.pptx
ukinternationalestat
 
Packet switching
Vikash Dhal
 
key distribution in network security
babak danyal
 
Cyber security Unit 3 Cryptography and Network security
eticket4403
 
ch07.ppt
ssuser4198c4
 
Cryptography Overview Presentation circa 2005
Dan Houser
 
Bt0088 cryptography and network security2
Techglyphs
 
Understanding senetas layer 2 encryption
Senetas
 
CS553 ST7 Ch21 Network Security chapter 21
KhaledMohammadSoradi
 
CS553_ST7_Ch21-NetworkSecurityhhhhggg.ppt
BinyamBekeleMoges
 
network security
Srinivasa Rao
 
Web Presen
guest79a91d
 
network security
BishalWosti1
 
Network Security Chapter 7
AfiqEfendy Zaen
 
lecture 7.pptx
MelkamuEndale1
 
Net Security Basic
phanleson
 
Chapter 8Secure Transport LayerIn the early days of th
JinElias52
 
Fundamental Concept of Cryptography in Computer Security
Uttara University
 
Hardware Network Trojans for neural Networks
gayathrid55
 
Week13presentation
yuki0722_0007
 
Encryption in information security ppt slideshare.pptx
ukinternationalestat
 
Ad

Recently uploaded (20)

PDF
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
PPTX
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
PDF
FLEX-LNG-Company-Presentation-Nov-2017.pdf
jbloggzs
 
PDF
Top 10 read articles In Managing Information Technology.pdf
IJMIT JOURNAL
 
PDF
Traditional Exams vs Continuous Assessment in Boarding Schools.pdf
The Asian School
 
PPTX
Information Retrieval and Extraction - Module 7
premSankar19
 
PPTX
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PPTX
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
PPTX
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
PDF
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
PDF
Biodegradable Plastics: Innovations and Market Potential (www.kiu.ac.ug)
publication11
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PDF
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
PPT
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
PDF
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
PDF
JUAL EFIX C5 IMU GNSS GEODETIC PERFECT BASE OR ROVER
Budi Minds
 
PDF
20ME702-Mechatronics-UNIT-1,UNIT-2,UNIT-3,UNIT-4,UNIT-5, 2025-2026
Mohanumar S
 
PDF
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
PPT
SCOPE_~1- technology of green house and poyhouse
bala464780
 
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
FLEX-LNG-Company-Presentation-Nov-2017.pdf
jbloggzs
 
Top 10 read articles In Managing Information Technology.pdf
IJMIT JOURNAL
 
Traditional Exams vs Continuous Assessment in Boarding Schools.pdf
The Asian School
 
Information Retrieval and Extraction - Module 7
premSankar19
 
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
Biodegradable Plastics: Innovations and Market Potential (www.kiu.ac.ug)
publication11
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
JUAL EFIX C5 IMU GNSS GEODETIC PERFECT BASE OR ROVER
Budi Minds
 
20ME702-Mechatronics-UNIT-1,UNIT-2,UNIT-3,UNIT-4,UNIT-5, 2025-2026
Mohanumar S
 
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
SCOPE_~1- technology of green house and poyhouse
bala464780
 

Confidentiality using symmetric encryption.pptx

  • 3. Confidentiality using Symmetric Encryption • Traditionally symmetric encryption is used to provide message confidentiality. • Consider a typical scenario •Workstations on LANs access other workstations & servers on LAN •LANs are interconnected using switches/routers •With external lines or radio/satellite links
  • 5. Confidentiality using Symmetric Encryption •Consider attacks and placement in this scenario •Snooping from another workstation •Use dial-in to LAN or a server to snoop •Use external router link to enter & snoop •Monitor and/or modify traffic on external links
  • 6. Confidentiality using Symmetric Encryption •Have two major placement alternatives •Link Encryption •End-to-End Encryption
  • 7. Location of Encryption Device Link Encryption • Encryption devices are placed at each end of the link • Encryption occurs independently on every link • All the communication is made secure • A lot of encryption devices are required
  • 8. Link Encryption Implications •All paths must use link encryption •Each pair of node must share a unique key •Large number of keys should be provided
  • 9. End-to-End Encryption • Source encrypts and the Receiver decrypts • Payload encrypted • Header in the clear • Only destination and reciever share the key • High Security: Booth link and end-to-end encryptions are needed.
  • 10. Encryption Across a Packet Switching Network
  • 11. Traffic Analysis • When using end-to-end encryption must leave headers in clear • So network can correctly route information • Although content is protected, traffic flow patterns are not • Ideally want both at once • End-to-End protects data contents over entire path and provides authentication • Link protects traffic flows from monitoring
  • 12. Placement of Encryption • Can place encryption function at various layers in OSI Reference Model • Link encryption occurs at layers 1 or 2 • End-to-End can occur at layers 3, 4, 6, 7 • As move higher, less information is encrypted but it is more secure and more complex with entitled and keys
  • 13. Encryption coverage implications of store and forward communications
  • 14. Traffic Analysis • Monitoring of communications flows between parties • Useful both in military & commercial spheres • Link encryption obscures header details • But overall traffic volumes in networks and at endpoints is still visible • Traffic padding can further obscure flows • But at cost of continuous traffic
  • 15. • Presented by: Ayush Jain • Enrolment number: IU1941090004